—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
– ————————————————————————-
Debian Security Advisory DSA-3463-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 31, 2016 https://www.debian.org/security/faq
– ————————————————————————-
Package : prosody
CVE ID : CVE-2016-0756
It was discovered that insecure handling of dialback keys may allow
a malicious XMPP server to impersonate another server.
For the oldstable distribution (wheezy), this problem has been fixed
in version 0.8.2-4+deb7u4.
For the stable distribution (jessie), this problem has been fixed in
version 0.9.7-2+deb8u3.
For the unstable distribution (sid), this problem has been fixed in
version 0.9.10-1.
We recommend that you upgrade your prosody packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=bLSK
—–END PGP SIGNATURE—–